Use the ____ command to create a list with more than one level, such as the following list:
1.   Conduct needs assessment
1.1 Collect data1.2 Analyze data
2.   Sequence events

A. bullets
B. indent
C. multilevel list
D. numbering


Answer: C

Computer Science & Information Technology

You might also like to view...

Many block ciphers have a __________ structure which consists of a number of identical rounds of processing and in each round a substitution is performed on one half of the data being processed, followed by a permutation that interchanges the two halves. ? ?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Briefly define the term “menu.” Write your answer on a piece of paper and put it upside down on the table together with the definitions of four other students. Compare all five definitions and discuss any substantial difference.

What will be an ideal response?

Computer Science & Information Technology

Network firewall entry and exit points are called ____.

A. sockets B. ports C. gateways D. proxies

Computer Science & Information Technology

Because a(n) shape tween uses symbols, it is an efficient way to animate objects.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology